US20140373168A1 - Method of protecting privacy data of an application program and apparatus using the same - Google Patents

Method of protecting privacy data of an application program and apparatus using the same Download PDF

Info

Publication number
US20140373168A1
US20140373168A1 US14/471,745 US201414471745A US2014373168A1 US 20140373168 A1 US20140373168 A1 US 20140373168A1 US 201414471745 A US201414471745 A US 201414471745A US 2014373168 A1 US2014373168 A1 US 2014373168A1
Authority
US
United States
Prior art keywords
space
application program
privacy
normal
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/471,745
Other languages
English (en)
Inventor
Yong Chen
Xeusheng Qi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Publication of US20140373168A1 publication Critical patent/US20140373168A1/en
Assigned to TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED reassignment TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEN, YONG, QI, XUESHENG
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Definitions

  • the present application relates to data processing technique field, and particularly, to a method of protecting privacy data of an application program and an apparatus using the same.
  • the application programs (APP) implemented in the terminal device is increasing.
  • some application programs for example social applications such as Wechat, Weibo (Micro-blog), MoMo and the like, own mass users and those users are high on communication with each other by using such social applications.
  • the privacy data may be the data such as contacts information of contacts and chatting records and so on. Therefore, the issue of protecting privacy following the privacy data becomes more and more important. For example, in case that the cell phone is lost, or in case that the cell phone may be lent to other people, the screen of a cell phone can be seen by other people (such case often occurs), which could cause the leakage of the privacy data of the user of the application program in the cell phone.
  • Prior art provides a protection method of the user privacy data of the application program, as shown in FIG. 1 .
  • This method has the function to set password lock protection for an application program. If an application program is locked, that is, an access password is set, when the user access the locked application program, a password interface will pop up, as shown in the right of FIG. 1 , the user can enter the application program only after inputting the right password in the password interface, and access the user data in the application program.
  • prior art has the following backwards: The method directly restricts the right of the user to access an application program. Although other people can not obtain the privacy data of the application program at the first time, the method obviously suggests other people: “there is a secret in the application program, so it needs to using a password to access.” This obvious suggestion may cause a motivation of other people to decrypt the password, and the existing password decryption technique can easily be utilized to decrypt the password, therefore, cause the leakage of the user privacy data.
  • the present application provides an application program privacy data protection method, which can completely protect the privacy data of the application program in the user terminal without being aware of the privacy data.
  • the method for protecting privacy data of an application program according to the present application is applied to a terminal device having a normal space which includes a corresponding user interface and data storage area.
  • the method comprises: creating a privacy space, the created privacy space having a user interface and a data storage area and the user interface of the created privacy space is the same as the user interface of the said normal space; determining whether an application program has been installed into the normal space when installing the application program into the privacy space; installing the application program into the privacy space, storing related data of the application program into the data storage area of the privacy space and displaying an icon of the application program in the user interface of the privacy space if the application program has been installed into the normal space; or installing the application program in the privacy space and the normal space respectively, storing the related data of the application program into the respective data storage areas of the privacy space and the normal space and displaying an icon of the application program on the respective user interfaces of the privacy space and the normal space if the application program has not been installed into the normal space.
  • an application program privacy data protection method is provided, which is applied to a terminal device having a normal space and a privacy space each of which has a user interface and a data storage area and the user interface of the privacy space being same as the user interface of the normal space.
  • the method comprises: installing a same application program into the privacy space and the normal space respectively; storing related data of the installed application program into the respective data storage areas of the privacy space and the normal space respectively; and displaying an icon of the installed application program in the respective user interfaces of the privacy space and the normal space respectively.
  • the present application provides an application program privacy data protection apparatus being implemented in a terminal device having a normal space which includes a user interface and a data storage area.
  • the apparatus comprises: a space creating unit configured to create a privacy space having a user interface and a data storage area, the user interface of the created privacy space being same as that of the normal space; a first determination unit configured to determine whether an application program has been installed into the normal space when an application program is to be installed; and an application program installation unit configured to, if the application program has been installed into the normal space, install the application program into the privacy space, store related data of the application program into the data storage area of the privacy space, and display an icon of the application program in the user interface of the privacy space if the application program has been installed into the normal space, or if the application program has not been installed into the normal space, install the application program in the privacy space and the normal space respectively, store the related data of the application program into the respective data storage areas of the privacy space and the normal space, and display an icon of the application program on the respective
  • the present application provides an application program privacy data protection apparatus being implemented in a terminal device having a normal space and a privacy space each of which having a user interface and a data storage area, the user interface of the privacy space being same as the user interface of the normal space are same.
  • the application program privacy data protection apparatus comprises: an application program installation unit configured to install a same application program into the privacy space and the normal space respectively, storing related data of the installed application program into the respective data storage areas of the privacy space and the normal space respectively, and display an icon of the installed application program in the respective user interfaces of the privacy space and the normal space respectively.
  • the embodiment of the present application has advantageous effects: the embodiment of the present application, when installing an application program, by creating privacy space, guarantees the application program has been installed into both the privacy space and the normal space, since the storage area of the related data of the installed application programs is different, the applications of the application programs in different spaces are independent, although the icons and functions and the like of application programs that can be seen in the user interface of different spaces are the same, the user data of the application programs are independent, that is, the data stored in a data storage area that a normal space corresponds to is the ordinary data (non-privacy data) of the application program, the data stored in a data storage area that a privacy space corresponds to is the privacy data of the application program, therefore, the privacy data of an application program can be protected effectively, the security of the privacy data can be improved.
  • FIG. 1 is a schematic diagram of an existing method for protecting privacy data of an application program.
  • FIG. 2 is a flowchart of implementing a method for protecting privacy data of an application program according to a first embodiment of the present application.
  • FIG. 3 is a flowchart of implementing a method for protecting privacy data of an application program according to a second embodiment of the present application
  • FIG. 4 is a flowchart of implementing a method for protecting privacy data of an application program according to a third embodiment of the present application.
  • FIG. 5 is a flowchart of implementing a method for protecting privacy data of an application program according to a fourth embodiment of the present application.
  • FIG. 2 is a flowchart of implementing a method for protecting privacy data of an application program according to a first embodiment of the present application.
  • the method is implemented in a terminal device having a normal space.
  • the normal space includes the corresponding user interface and data storage area.
  • the method includes the flowing steps.
  • a privacy space is created.
  • a privacy space creation button or a privacy space creation instruction can be preset.
  • a terminal After receiving a privacy space creation instruction issued by the user clicking the privacy space creation button, a terminal begins to create a privacy space.
  • Creating such a privacy space includes creating identification, a user interface and a data storage area and so on that the privacy space corresponds to.
  • At least one privacy space is created and application programs installed in each of privacy space may be the same or different from each other.
  • the user interfaces of the privacy space and the normal space created by the embodiment are the same. That is, all the layouts, styles and colors of the privacy space and the normal space are the same (the user interface of the privacy space can be created by the user based on the user interface of the normal space, or automatically created by the system based on the user interface of the normal space.
  • the data associated with the user interface of the user interface are copied into the data storage area of the privacy space and a main screen is newly created, and the copied related data are displayed on the main screen.
  • the data storage area assigned to privacy space is different from that of the normal space. For example, if the data storage area of the normal space is disc C, the data storage area of the privacy space is assigned to D disc.
  • a space creation button or a space switching instruction (for example, slide to left or to right or the like) need to be set.
  • a terminal switches from the normal space to the privacy space or from the privacy space to the normal space.
  • the terminal device only corresponds to one space. That is, the terminal is in one working mode when operating and can be switched into other space according to a switching operation of the user. For example, a terminal device runs in a normal space by the default and the terminal can be switched from the normal space into the privacy space, and vice versa, the he terminal can be switched back from the privacy space into the normal space.
  • the authentication information need to be inputted. The switching from the normal space to the privacy space cannot be made until detecting input authentication information is the same as the preset authentication information.
  • the terminal when the user clicks the space switch button or issues a space switching instruction, the terminal firstly determines whether the current space is a normal space or a privacy space. If the current space is a normal space, it is detected whether the information identical to the authentication information is received. If the received information is the same as the predetermined authentication information, the terminal switches from the normal space to the privacy space. Otherwise, if the current space is a privacy space the terminal switches from the privacy space into the normal space directly.
  • the authentication information can be preset by the user and can be several digits, letters and/or gestures (for example, counterclockwise sliding or clockwise sliding on the screen).
  • step S 202 when installing an application program, it is determined whether an application program has been installed in the normal space. If the result of the determination is “yes”, the process proceeds to step S 203 . Otherwise, the process proceeds to step S 204 .
  • it is able to determine whether an application program has been installed in the normal space by detecting whether the icon of the application program are displayed on the user interface of the normal space and/or the data storage area of the normal space has the application program.
  • an application program is installed in the privacy space, the related data of the installed application program is stored in the data storage area of the privacy space, and the icon of the installed application program is displayed on the user interface of the privacy space.
  • displaying the icon of the application program on the user interface of the privacy space can be performed by user manual operation, that is, the icon of the application program can be manually added to the user interface of the privacy space, or the icon of the application program can be automatically added to the user interface of the privacy space by the system.
  • the installation path of the application program needs to be changed (that is, the installation path of the application program is changed to the storing path of the data storage area of the privacy space) and/or the name of the application program installation file needs to be changed, the related data of the installed application program is stored in the data storage area of the privacy space, and the icon of the installed the application program is displayed on the user interface of the privacy space.
  • the application program is installed in the privacy space and normal space respectively, the related data of the installed application program is stored in the data storage area of the privacy space and the data storage area of the normal space respectively, and the icon of the installed the application program is displayed on the user interface of the privacy space and the user interface of the normal space respectively.
  • the non-user data (including kind, amount, icon of application programs) of any application program are the same in both the normal space and the privacy space. That is, it is ensured that the normal space and the privacy space have the same application programs installed therein.
  • the installation order is not be limited to that mentioned above.
  • an application program into the privacy space when installing an application program into the privacy space specifically, it is needed to determine whether the application program is an application program to be protected or not in advance and then the application program is installed into the privacy space in case that t the application program is an application program to be protected.
  • the basic information of the installation can be set through an application program installation interface, the basic information includes a installation path, whether an application program is to be protected and so on.
  • the terminal device determines whether an application program is an application program to be protected based on the basic information. If the result of the determination is yes, the application program is installed under the installation path associated with the privacy space and the normal space.
  • this terminal device can automatically switch to the normal space when detecting the time during which the user did not operate (that is, the cell phone is in the waiting state) exceeds a preset value (for example, 1 minute).
  • a preset value for example, 1 minute.
  • the terminal device can determine whether an application program is currently running in the privacy space when detecting the operation switching from the privacy space to the normal space. If an application program is currently running in the privacy space, the terminal device terminates the running of the application program in the privacy space and starts the same application program in the normal space.
  • the terminal device can quickly switch the cell phone from the privacy space into the normal space, meanwhile, and start the application program being in the normal space same as the terminated application program in the privacy space.
  • this embodiment of the present application can guarantee that the application program is installed in both the normal space and the privacy space through the following operations: creating the privacy space, if the application program is installed in the normal space, then the application program is installed in the privacy space, if the application program is not installed in the normal space, then the application program is installed in the normal space and the privacy space respectively.
  • the storage area of the related data of the installed application program is different, so the application of the application program in a different is independent, although icons and functions and the like of application programs seen in the user interface of different spaces are the same, the user data of the application programs are independent, that is, the data stored in the data storage area that the normal space corresponds to are the ordinary data (non-privacy data) of the application program, the data stored in a data storage area that the privacy space corresponds to are the privacy data of the application program, therefore, the privacy data of an application program can be protected effectively, the security of the privacy data can be improved.
  • Creating a privacy space includes creating the user interface and the data storage area that the privacy space corresponds to. Wherein, the created user interface of the privacy space and the created user interface of the normal space are the same, the data storage area of the privacy space and the data storage area of the normal space are different.
  • the storage space assigned to the normal space is disc C
  • the storage space assigned to the privacy space is disc D.
  • the application program waiting to be installed is the QQ. Before installing the QQ, first, it is determined whether the QQ has been installed in the normal space or not (that is, to determine whether there is a the QQ-related folder under disc C directory and/or a the QQ icon is displayed in the user interface of the normal space or not), if the result of the determination is yes, the QQ is installed disc also; otherwise, the QQ is installed disc C and disc respectively, and the icon of the installed QQ is displayed on the user interfaces that the normal space and the piracy space correspond to respectively.
  • the QQ in the normal space is stopped, and the QQ in the normal space is initiated. Since the user interfaces of the normal space and the privacy space and the QQ icons and functions on the user interfaces are the same, therefore, other people will be led to misunderstand there are no privacy data, the privacy data of the application program in the user terminal can be protected without any trail. Moreover, since two QQ are installed in different discs respectively, when upgrading or updating the QQ in a space, the QQ in another space will not be affected, for example, the QQ version used in the normal space is Version 2013, the QQ version used in the privacy space is Version 2012.
  • FIG. 3 is a flowchart of implementing a method for protecting privacy data of an application program according to a second embodiment of the present application.
  • the application scenario of the method is applied to a terminal device having a normal space and privacy space.
  • Both the normal space and privacy space include a user interface and a data storage area that the normal space and privacy space correspond to, wherein, the user interface of the privacy space and the user interface of the normal space are the same, the data storage area of the privacy space and the data storage area of the normal space are different, the detailed description of the process of it is given below:
  • step S 301 when installing an application program, the application program is installed in the privacy space and normal space respectively, the related data of the installed application program are stored into the data storage area of the privacy space and the data storage area of the normal space respectively, and the icon of the installed application program is displayed on the user interface of the privacy space and the user interface of the normal space respectively.
  • the terminal device of this embodiment has created a normal space and a privacy space in advance.
  • the terminal device detects that the user is installing the application program, it automatically installs the application program in both the normal space and privacy space respectively so as to protect the privacy data of the application program in the user terminal without any trail.
  • installing the application program in the normal space and privacy space respectively ensures that icons displayed in the respective interfaces of the normal space and privacy space and functions thereof are the same. Further, with this configuration, the data incompatibility caused by application program upgrading can be avoided effectively.
  • Other aspects of the embodiment and embodiment 1 are the same. Therefore, the description with respect to the other aspect of the embodiment is omitted for simplicity.
  • FIG. 4 is a flowchart of implementing a method for protecting privacy data of an application program according to a third embodiment of the present application. For the sake of illustration, only the part related with this embodiment of the present application is shown.
  • the application program privacy data protection apparatus is applied to a terminal device (for example, cell phone, flat computer, handheld computer, computer and the like) including a normal space, the normal space includes the corresponding user interface and data storage area.
  • a terminal device for example, cell phone, flat computer, handheld computer, computer and the like
  • the normal space includes the corresponding user interface and data storage area.
  • the application program privacy data protection apparatus includes a space creation unit 41 , a first determination unit 42 , and an application program installation unit 43 .
  • the space creating unit 41 is configured to create a privacy space having a user interface and a data storage area, the user interface of the created privacy space being same as that of the normal space and the data storage area of the created privacy space being different from the data storage area of the normal space.
  • the first determination unit 42 is configured to determine whether an application program has been installed into the normal space when an application program is to be installed.
  • the application program installation unit 43 is configured to, if the application program has been installed into the normal space, install the application program into the privacy space, store related data of the application program into the data storage area of the privacy space, and display an icon of the application program in the user interface of the privacy space if the application program has been installed into the normal space, or if the application program has not been installed into the normal space, install the application program in the privacy space and the normal space respectively, store the related data of the application program into the respective data storage areas of the privacy space and the normal space, and display an icon of the application program on the respective user interface of the privacy space and the user interface of the normal space.
  • the application program installation unit 43 comprises a first determination module 431 configured to determine whether the application program is an application program to be protected and a first installation module 432 configured to install the application program into the privacy space if the application program is the application program to be protected.
  • the application program privacy data protection apparatus further comprises a first setting unit 44 configured to set a switching mode between the normal space and the privacy space so that a switching operation between the normal space and the privacy space can be performed after the switching mode is triggered.
  • the application program privacy data protection apparatus further comprises: a second setting unit 45 configured to set authentication information for entering into the privacy space; a second determination unit 46 configured to determining whether a current space is the normal space or the privacy space after the switching mode is triggered; a second switch unit 49 configured to switch from the privacy space into the normal space directly in case that the current space is the privacy space; a detecting unit 47 configured to determine whether information same as the authentication information is received in case that the current space is the normal space; and a first switch unit 49 configured to switch from the normal space into the privacy space in case that the information same as the authentication information is received.
  • the application program privacy data protection apparatus further comprises a third switch unit 410 configured to switch the privacy space into the normal space in case that the current space is the privacy space and is not operated for a time exceeding a preset time.
  • the application program privacy data protection apparatus further comprises: a third determination unit 411 configured to determine whether an application program is currently running in the privacy space before switching from the privacy space to the normal space; and an starting unit 412 configured to terminate the application program running in the privacy space and starting the application program in the normal space same as the terminated application program in the privacy space in case that the application program is currently running in the privacy space.
  • FIG. 5 is a flowchart of implementing a method for protecting privacy data of an application program according to a fourth embodiment of the present application. For the sake of illustration, only the part related with this embodiment of the present application is shown.
  • the application program privacy data protection apparatus is applied to a terminal device (for example, cell phone, flat computer, handheld computer, computer and the like) including a normal space and a privacy space, both the normal space and privacy space include the corresponding user interface and data storage area, wherein, the user interface of the privacy space and the user interface of the normal space are the same, the data storage area of the privacy space and the data storage area of the normal space are different.
  • a terminal device for example, cell phone, flat computer, handheld computer, computer and the like
  • both the normal space and privacy space include the corresponding user interface and data storage area, wherein, the user interface of the privacy space and the user interface of the normal space are the same, the data storage area of the privacy space and the data storage area of the normal space are different.
  • the application program privacy data protection apparatus includes an application program installation unit 51 which is configured to install a same application program into the privacy space and the normal space respectively, storing related data of the installed application program into the respective data storage areas of the privacy space and the normal space respectively, and display an icon of the installed application program in the respective user interfaces of the privacy space and the normal space respectively.
  • An application program privacy data protection apparatus being implemented in a terminal device having a normal space and a privacy space each of which having a user interface and a data storage area, the user interface of the privacy space being same as the user interface of the normal space are same, and the application program privacy data protection apparatus comprising:
  • the application program installation unit 51 comprises a first determination module 511 configured to determine whether the application program is an application program to be protected and a first installation module 512 configured to install the application program into the privacy space if the application program is the application program to be protected.
  • the application program privacy data protection apparatus further comprises a first setting unit 52 configured to set a switching mode between the normal space and the privacy space so that a switching operation between the normal space and the privacy space can be performed after the switching mode is triggered.
  • the application program privacy data protection apparatus further comprises: a second setting unit 53 configured to set authentication information for entering into the privacy space; a second determination unit 54 configured to determining whether a current space is the normal space or the privacy space after the switching mode is triggered; a second switch unit 57 configured to switch from the privacy space into the normal space directly in case that the current space is the privacy space; a detecting unit 55 configured to determine whether information same as the authentication information is received in case that the current space is the normal space; and a first switch unit 56 configured to switch from the normal space into the privacy space in case that the information same as the authentication information is received.
  • the application program privacy data protection apparatus further comprises a third switch unit 58 configured to switch the privacy space into the normal space in case that the current space is the privacy space and is not operated for a time exceeding a preset time.
  • the application program privacy data protection apparatus further comprises: a third determination unit 59 configured to determine whether an application program is currently running in the privacy space before switching from the privacy space to the normal space; and an starting unit 510 configured to terminate the application program running in the privacy space and starting the application program in the normal space same as the terminated application program in the privacy space in case that the application program is currently running in the privacy space.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)
US14/471,745 2013-04-12 2014-08-28 Method of protecting privacy data of an application program and apparatus using the same Abandoned US20140373168A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201310127870.0A CN104102882B (zh) 2013-04-12 2013-04-12 一种应用程序隐私数据的保护方法及装置
CN201310127870.0 2013-04-12
PCT/CN2013/089971 WO2014166280A1 (en) 2013-04-12 2013-12-19 Method of protecting privacy data of an application program and apparatus using the same

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/089971 Continuation WO2014166280A1 (en) 2013-04-12 2013-12-19 Method of protecting privacy data of an application program and apparatus using the same

Publications (1)

Publication Number Publication Date
US20140373168A1 true US20140373168A1 (en) 2014-12-18

Family

ID=51671025

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/471,745 Abandoned US20140373168A1 (en) 2013-04-12 2014-08-28 Method of protecting privacy data of an application program and apparatus using the same

Country Status (3)

Country Link
US (1) US20140373168A1 (zh)
CN (1) CN104102882B (zh)
WO (1) WO2014166280A1 (zh)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224356A (zh) * 2015-08-28 2016-01-06 北京金山安全软件有限公司 一种目录清除方法、装置及移动终端
CN105354487A (zh) * 2015-10-23 2016-02-24 北京金山安全软件有限公司 应用监控处理方法、装置及终端设备
US20160055339A1 (en) * 2013-04-07 2016-02-25 Zte Corporation Encryption Processing Method and Device for Application, and Terminal
US9384357B2 (en) * 2014-10-01 2016-07-05 Quixey, Inc. Providing application privacy information
CN105809043A (zh) * 2016-03-03 2016-07-27 丽水市职业高级中学 一种计算机的数据安全保护方法
CN106022105A (zh) * 2016-05-24 2016-10-12 北京金山安全软件有限公司 一种指令处理方法及装置
CN106250772A (zh) * 2016-07-28 2016-12-21 北京小米移动软件有限公司 蓝牙扫描控制方法、装置及终端设备
CN107133498A (zh) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 一种隐私应用管理方法和装置及移动终端
CN107437024A (zh) * 2017-08-02 2017-12-05 深圳天珑无线科技有限公司 应用处理方法、应用处理装置和终端
CN107479923A (zh) * 2017-08-07 2017-12-15 青岛海信电器股份有限公司 应用程序升级方法、装置及显示终端
CN108563475A (zh) * 2018-04-16 2018-09-21 百度在线网络技术(北京)有限公司 应用程序的运行方法、装置及存储介质
CN110099166A (zh) * 2019-04-01 2019-08-06 努比亚技术有限公司 应用启动方法、终端及计算机可读存储介质
US10824743B2 (en) * 2014-08-26 2020-11-03 Pahmet Llc System and method for autonomous or remote controlled destruction of stored information or components

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850768A (zh) * 2015-02-10 2015-08-19 数据通信科学技术研究所 一种基于应用安全等级的访问控制方法及装置
CN105979062B (zh) * 2016-04-14 2020-01-10 北京小米移动软件有限公司 通讯事件处理方法及装置
CN106130731A (zh) * 2016-06-22 2016-11-16 宇龙计算机通信科技(深圳)有限公司 一种域空间切换方法及系统
CN106503506B (zh) * 2016-10-31 2019-08-20 维沃移动通信有限公司 一种信息显示方法及电子设备
CN106778348A (zh) * 2016-12-23 2017-05-31 北京奇虎科技有限公司 一种隔离隐私数据的方法和装置
CN106650336B (zh) * 2016-12-28 2020-02-25 北京珠穆朗玛移动通信有限公司 应用程序的保护方法及移动终端
CN106990980B (zh) * 2017-03-08 2020-07-31 北京小米移动软件有限公司 用户空间创建方法及装置
CN106886416B (zh) * 2017-03-08 2020-03-17 北京小米移动软件有限公司 多用户空间处理方法及装置
CN107180201A (zh) * 2017-04-25 2017-09-19 上海与德科技有限公司 隐私空间的创建方法及装置
CN108549823B (zh) * 2018-04-10 2020-06-12 Oppo广东移动通信有限公司 终端的多角色使用方法和装置、电子设备
CN108573168A (zh) * 2018-04-10 2018-09-25 Oppo广东移动通信有限公司 隐私空间启动方法和装置、存储介质、电子设备
CN108574761A (zh) * 2018-04-25 2018-09-25 瓦戈科技(上海)有限公司 一种手机登录隐私系统的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050252963A1 (en) * 2004-04-30 2005-11-17 Adams Neil P System and method of operation control on an electronic device
US20090125902A1 (en) * 2007-03-01 2009-05-14 Ghosh Anup K On-demand disposable virtual work system
US20100235881A1 (en) * 2009-03-11 2010-09-16 Microsoft Corporation Enabling Sharing of Mobile Communication Device
US20120159139A1 (en) * 2010-12-21 2012-06-21 Dongwoo Kim Mobile terminal and method of controlling a mode switching therein

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060192768A1 (en) * 2005-02-25 2006-08-31 Inventec Corporation Remote control device with touch function and method for processing the same
CN101026822A (zh) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 一种保护手机隐私资料的方法
CN101272589B (zh) * 2007-03-21 2012-05-23 展讯通信(上海)有限公司 一种切换手机设备号保护用户隐私的方法及其手机
US20120005720A1 (en) * 2010-07-01 2012-01-05 International Business Machines Corporation Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches
CN102938032B (zh) * 2012-10-17 2017-09-22 中兴通讯股份有限公司 一种对通讯终端上应用程序加、解密的方法、系统和终端
CN102932542B (zh) * 2012-10-26 2015-04-01 东莞宇龙通信科技有限公司 移动终端工作模式切换方法及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050252963A1 (en) * 2004-04-30 2005-11-17 Adams Neil P System and method of operation control on an electronic device
US20090125902A1 (en) * 2007-03-01 2009-05-14 Ghosh Anup K On-demand disposable virtual work system
US20100235881A1 (en) * 2009-03-11 2010-09-16 Microsoft Corporation Enabling Sharing of Mobile Communication Device
US20120159139A1 (en) * 2010-12-21 2012-06-21 Dongwoo Kim Mobile terminal and method of controlling a mode switching therein

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160055339A1 (en) * 2013-04-07 2016-02-25 Zte Corporation Encryption Processing Method and Device for Application, and Terminal
US9977907B2 (en) * 2013-04-07 2018-05-22 Zte Corporation Encryption processing method and device for application, and terminal
US10824743B2 (en) * 2014-08-26 2020-11-03 Pahmet Llc System and method for autonomous or remote controlled destruction of stored information or components
US9858437B2 (en) 2014-10-01 2018-01-02 Samsung Electronics Co., Ltd. Privacy-respecting computerized application search system
US9384357B2 (en) * 2014-10-01 2016-07-05 Quixey, Inc. Providing application privacy information
CN105224356A (zh) * 2015-08-28 2016-01-06 北京金山安全软件有限公司 一种目录清除方法、装置及移动终端
CN105354487A (zh) * 2015-10-23 2016-02-24 北京金山安全软件有限公司 应用监控处理方法、装置及终端设备
CN105809043A (zh) * 2016-03-03 2016-07-27 丽水市职业高级中学 一种计算机的数据安全保护方法
CN106022105A (zh) * 2016-05-24 2016-10-12 北京金山安全软件有限公司 一种指令处理方法及装置
CN106250772A (zh) * 2016-07-28 2016-12-21 北京小米移动软件有限公司 蓝牙扫描控制方法、装置及终端设备
CN107133498A (zh) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 一种隐私应用管理方法和装置及移动终端
CN107437024A (zh) * 2017-08-02 2017-12-05 深圳天珑无线科技有限公司 应用处理方法、应用处理装置和终端
CN107479923A (zh) * 2017-08-07 2017-12-15 青岛海信电器股份有限公司 应用程序升级方法、装置及显示终端
CN108563475A (zh) * 2018-04-16 2018-09-21 百度在线网络技术(北京)有限公司 应用程序的运行方法、装置及存储介质
CN110099166A (zh) * 2019-04-01 2019-08-06 努比亚技术有限公司 应用启动方法、终端及计算机可读存储介质

Also Published As

Publication number Publication date
CN104102882B (zh) 2017-05-03
CN104102882A (zh) 2014-10-15
WO2014166280A1 (en) 2014-10-16

Similar Documents

Publication Publication Date Title
US20140373168A1 (en) Method of protecting privacy data of an application program and apparatus using the same
EP2857967B1 (en) User interface management method and system
US9032506B2 (en) Multiple application containerization in a single container
EP3370449B1 (en) Method and device for configuring security indication information
US20150052604A1 (en) Method and device for protecting user private data of application program
EP2492819B1 (en) Method and apparatus for protecting information based on data card
CN104331644A (zh) 一种智能终端文件的透明加解密方法
US20140283118A1 (en) OS Security Filter
US20140245457A1 (en) Method and device for initiating privacy mode of data processing apparatus
WO2014131308A1 (en) Method and device for initiating privacy mode of data processing apparatus
WO2016177000A1 (zh) 进入操作系统桌面的方法和移动智能终端
US10045174B1 (en) Managed device migration and configuration
CN104267982A (zh) 应用程序启动控制系统与控制方法
TWI629891B (zh) 一種適用於移動終端的私密資訊保護方法及系統
KR20140044972A (ko) 보안성이 우수한 실행환경을 제공하는 이동 컴퓨팅 시스템
US20150350219A1 (en) Profile change management
CN104035842A (zh) 一种删除和恢复内置应用程序的方法
WO2022156663A1 (zh) 应用程序管理方法、装置及电子设备
CN105574423B (zh) 一种终端设备及其文件管理方法
CN107704337B (zh) 恢复出厂设置的方法、移动终端及具有存储功能的装置
JP5429906B2 (ja) 携帯端末、プログラム、及び制御方法。
CN106648962A (zh) 一种多开应用的管理方法、装置及智能终端
JP2014109882A (ja) 情報処理装置、情報処理方法及びプログラム
CN106648298B (zh) 一种应用的控制方法、装置和移动终端
WO2021233351A1 (zh) 数据转移方法及装置、终端和计算机可读存储介质

Legal Events

Date Code Title Description
AS Assignment

Owner name: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, CHI

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHEN, YONG;QI, XUESHENG;REEL/FRAME:034693/0790

Effective date: 20140813

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION